Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-59820

Опубликовано: 26 нояб. 2025
Источник: debian
EPSS Низкий

Описание

In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kritafixed1:5.2.13+dfsg-1package

Примечания

  • https://kde.org/info/security/advisory-20250929-1.txt

  • Fixed by: https://commits.kde.org/krita/6d3651ac4df88efb68e013d21061de9846e83fe8 (v5.2.13)

EPSS

Процентиль: 9%
0.00033
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
2 месяца назад

In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.

CVSS3: 6.7
nvd
2 месяца назад

In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.

CVSS3: 6.7
github
2 месяца назад

In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.

EPSS

Процентиль: 9%
0.00033
Низкий